From the course: Kali Linux Essential Training
Unlock the full course today
Join today to access over 24,500 courses taught by industry experts.
Overview of exploitation tools - Linux Tutorial
From the course: Kali Linux Essential Training
Overview of exploitation tools
- [Instructor] Just finding vulnerabilities in the target isn't sufficient. As professional penetration testers, we have to demonstrate that these weaknesses are exploitable, and as such, justify additional protection. Carly provides a number of exploitation tools that can be used to identify weaknesses, which allow unauthorized entry into systems. Let's take a look at two that we'll use a lot when doing our penetration testing. Metasploit is the foundation tool used by penetration testers for identifying weaknesses in systems and provides extensive capabilities for demonstrating them. It operates from a console interface, and it's supported by a large database of tests that can be selected and used to attempt to exploit a weakness. It can also interface with tools such as Nmap and Nessus to integrate information gathering. Hydra is a command line tool used to spray usernames and passwords as a target and check for those…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.